Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31633 bookmarks
Custom sorting
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
In what is being called the largest supply chain attack in history, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising maintainers' accounts in a phishing attack.
·bleepingcomputer.com·
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Sans avocat au procĂšs, ce hacker de Switch finit par devoir une fortune Ă  Nintendo
Sans avocat au procĂšs, ce hacker de Switch finit par devoir une fortune Ă  Nintendo
Dans un accord signĂ© le 5 septembre 2025, Nintendo et le propriĂ©taire d'un site de piratage de Switch ont mis fin Ă  une bataille judiciaire entamĂ©e plus d'un an auparavant. Pour Ă©viter une procĂ©dure qui aurait pu s’éterniser, le hacker a choisi d’accepter les conditions du gĂ©ant japonais, auquel il doit dĂ©sormais la
·numerama.com·
Sans avocat au procĂšs, ce hacker de Switch finit par devoir une fortune Ă  Nintendo
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Salesloft says attackers first breached its GitHub account in March, leading to the theft of Drift OAuth tokens later used in widespread Salesforce data theft attacks in August.
·bleepingcomputer.com·
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Key Takeaways The intrusion began when a user downloaded and executed a malicious file impersonating DeskSoft’s EarthTime application but instead dropped SectopRAT malware. The threat actor d

·thedfirreport.com·
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Data security gaps stymy enterprise AI plans
Data security gaps stymy enterprise AI plans
Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock, according to a Ponemon Institute study commissioned by OpenText.
·cybersecuritydive.com·
Data security gaps stymy enterprise AI plans
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
With WSUS deprecated, it's time to move from an outdated legacy patching system to a modern one. Learn from Action1 how its modern patching platform offers cloud-native speed, 3rd-party coverage, real-time compliance, and zero infrastructure. Try it free now!
·bleepingcomputer.com·
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
Pour contrer les campagnes de dĂ©sinformation orchestrĂ©es par des acteurs Ă©trangers sur les rĂ©seaux sociaux, en particulier sur X, le ministĂšre des Affaires Ă©trangĂšres a annoncĂ© le lancement d’un compte officiel dĂ©diĂ© Ă  la riposte. Une initiative qui s’inscrit dans une stratĂ©gie de communication plus offensive de la
·numerama.com·
La diplomatie française lance French Response, un « compte officiel de riposte » sur X
Remote Access Abuse Biggest Pre-Ransomware Indicator
Remote Access Abuse Biggest Pre-Ransomware Indicator
Cisco Talos found that abuse of remote services and remote access software are the most prevalent ‘pre-ransomware’ tactics deployed by threat actors
·infosecurity-magazine.com·
Remote Access Abuse Biggest Pre-Ransomware Indicator
What is Continuous Compliance & How Do You Achieve It? | CSA
What is Continuous Compliance & How Do You Achieve It? | CSA
Continuous compliance is how modern teams stay secure, agile, and trusted. With the right systems in place, compliance stops being a burden.
·cloudsecurityalliance.org·
What is Continuous Compliance & How Do You Achieve It? | CSA
Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response
Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response
Explore lessons learned from over two years of Talos IR pre-ransomware engagements, highlighting the key security measures, indicators and recommendations that have proven effective in stopping ransomware attacks before they begin.
·blog.talosintelligence.com·
Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response
AI in Government - Schneier on Security
AI in Government - Schneier on Security
Just a few months after Elon Musk’s retreat from his unofficial role leading the Department of Government Efficiency (DOGE), we have a clearer picture of his vision of government powered by artificial intelligence, and it has a lot more to do with consolidating power than benefitting the public. Even so, we must not lose sight of the fact that a different administration could wield the same technology to advance a more positive future for AI in government. To most on the American left, the DOGE end game is a dystopic vision of a government run by machines that benefits an elite few at the expense of the people. It includes AI ...
·schneier.com·
AI in Government - Schneier on Security
« Grok, d'oĂč vient cette vidĂ©o ? », le nouveau piĂšge cybercriminel qui exploite l'IA de X - Numerama
« Grok, d'oĂč vient cette vidĂ©o ? », le nouveau piĂšge cybercriminel qui exploite l'IA de X - Numerama
Le 3 septembre 2025, Nati Tal, directeur de Guardio Labs, a rĂ©vĂ©lĂ© sur X le mode opĂ©ratoire d'une nouvelle menace cyber appelĂ©e « Grokking ». Une attaque oĂč l’IA du rĂ©seau social, Grok, est exploitĂ©e pour contourner la sĂ©curitĂ© et diffuser des liens malveillants auprĂšs de millions d'utilisateurs. Les mesures prises
·numerama.com·
« Grok, d'oĂč vient cette vidĂ©o ? », le nouveau piĂšge cybercriminel qui exploite l'IA de X - Numerama